Standards & Technologies
Future Development of Quantum Computing and Its Relevance to NATO
Future Development of Quantum Computing and Its Relevance to NATO." Connections: The Quarterly Journal 20, no. 2 (2021): 89-109.
"Introduction
Already in our era of “classical computing,” maintaining cybersecurity is an enormous challenge.
20.2.08_quantum.pdf — Downloaded 2473 times
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments
Aligning Ukrainian Concepts and Standards in Defence, Safety, and Cybersecurity to NATO and EU Developments." Information & Security: An International Journal 45 (2020): 5-6.
" 4500_editorial.pdf — Downloaded 1231 times
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack
Observing, Measuring and Collecting HDD Performance Metrics on a Physical Machine During Ransomware Attack." Information & Security: An International Journal 47, no. 3 (2020): 317-327.
" 4723_hdd_performance_during_ransomware_attack.pdf — Downloaded 2762 times
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies
Design of Technical Methods for Analysing Network Security Based on Identification of Network Traffic Anomalies." Information & Security: An International Journal 47, no. 3 (2020): 306-316.
" 4722_identification_network_traffic_anomalies.pdf — Downloaded 2750 times
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base
Educational NASA Project: Artificial Intelligence and Cybersecurity at a Mobile Lunar Base." Information & Security: An International Journal 46, no. 3 (2020): 321-333.
" 4624_nasa_mobile_lunar_base.pdf — Downloaded 2852 times
Security Analysis of Diceware Passphrases
Security Analysis of Diceware Passphrases." Information & Security: An International Journal 47, no. 2 (2020): 276-282.
" 4719_diceware_passphrases.pdf — Downloaded 4736 times
A New Steganographic Algorithm for Hiding Messages in Music
A New Steganographic Algorithm for Hiding Messages in Music." Information & Security: An International Journal 47, no. 2 (2020): 261-275.
" 4718_hiding_messages_in_music.pdf — Downloaded 3683 times
Public Key Generation Principles Impact Cybersecurity
Public Key Generation Principles Impact Cybersecurity." Information & Security: An International Journal 47, no. 2 (2020): 249-260.
" 4717_public_key_generation.pdf — Downloaded 3031 times
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space
One-way Function Based on Modified Cellular Automata in the Diffie-Hellman Algorithm for Big Data Exchange Tasks through Open Space." Information & Security: An International Journal 47, no. 2 (2020): 233-246.
" 4716_diffie-hellman_big_data.pdf — Downloaded 3009 times
Information Technology for Big Data Sensor Networks Stability Estimation
Information Technology for Big Data Sensor Networks Stability Estimation." Information & Security: An International Journal 47, no. 1 (2020): 141-154.
" 4710_big_data_sensor_networks_stability_estimation.pdf — Downloaded 2854 times